Results 61 to 70 of about 211,108 (260)

Key distribution and recovery algorithm based on Shamir's secret sharing

open access: yesTongxin xuebao, 2015
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG   +4 more
doaj   +2 more sources

The GHZ state in secret sharing and entanglement simulation

open access: yes, 2008
In this note, we study some properties of the GHZ state. First, we present a quantum secret sharing scheme in which the participants require only classical channels in order to reconstruct the secret; our protocol is significantly more efficient than the
Broadbent, Anne   +2 more
core   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Classifying avian drinking behaviour: ecological insights and implications in a changing world

open access: yesBiological Reviews, EarlyView.
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley   +1 more source

Innovating for Net‐Zero: Collaborative and Digital Decarbonisation Strategies in Sunset Industries' Global Value Chains

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Global net‐zero ambitions require transformative strategies to decarbonise carbon‐intensive global value chains (GVCs). This study examines how multinational enterprises (MNEs) in sunset industries integrate carbon capture technologies (CCT) with operational and supply chain dynamics (OSCD) to advance decarbonisation.
Muhammad Mustafa Kamal   +6 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Some Secret Sharing Based on Hyperplanes

open access: yesComputation
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes.
Guohui Wang, Yucheng Chen
doaj   +1 more source

Undetermined states: how to find them and their applications

open access: yes, 2010
We investigate the undetermined sets consisting of two-level, multi-partite pure quantum states, whose reduced density matrices give absolutely no information of their original states. Two approached of finding these quantum states are proposed.
A.M. Steane   +16 more
core   +1 more source

Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges

open access: yesNew Directions for Community Colleges, EarlyView.
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia   +2 more
wiley   +1 more source

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

open access: yesJournal of Communications Software and Systems, 2015
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8].
Anjaneyulu Endurthi   +3 more
doaj  

Home - About - Disclaimer - Privacy